Takeover Writeup

Subdomain enumeration and certificate inspection to find hidden flags

Introduction

This CTF focuses on subdomain enumeration — a critical reconnaissance technique used to discover hidden services and potential attack vectors. We'll use ffuf for fuzzing and inspect SSL certificates to uncover secrets.

🎯 Skills Covered

Subdomain enumeration, Virtual host fuzzing, SSL certificate inspection, DNS configuration

Subdomain Enumeration

First, let's enumerate subdomains using ffuf (Fuzz Faster U Fool). We'll use a wordlist to brute-force potential subdomains:

ffuf -u https://10.49.129.85 -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-5000.txt -H 'Host: FUZZ.futurevera.thm' -fs 4605

Breaking down this command:

ffuf subdomain enumeration results

ffuf discovering subdomains: blog and support

Two subdomains were identified:

Certificate Inspection

When visiting support.futurevera.thm, let's inspect the SSL certificate for additional information. Click on the padlock icon and view the certificate details.

SSL certificate showing Subject Alt Name

Certificate reveals a hidden subdomain in Subject Alt Names

In the Subject Alt Names section, we discover a hidden subdomain:

secrethelpdesk934752.support.futurevera.thm

💡 Pro Tip

Always inspect SSL certificates! They often contain additional DNS names in the Subject Alternative Name (SAN) field that aren't publicly advertised.

Accessing the Hidden Subdomain

Add the discovered subdomain to your /etc/hosts file:

sudo nano /etc/hosts

# Add this line:
10.49.129.85    secrethelpdesk934752.support.futurevera.thm

Now navigate to the hidden subdomain:

http://secrethelpdesk934752.support.futurevera.thm
Flag found

The flag is revealed in the URL!

🚩 Flag Captured!

flag{beea0d6edfcee06a59b83fb50ae81b2f}

Attack Summary

1

Subdomain Fuzzing

Used ffuf to discover blog and support subdomains via virtual host enumeration

2

Certificate Inspection

Examined SSL certificate and found hidden subdomain in Subject Alt Names

3

DNS Configuration

Added the secret subdomain to /etc/hosts

4

Flag Capture

Accessed the hidden subdomain and captured the flag

Key Takeaways

🔑 Lessons Learned

  • Enumerate subdomains — Hidden services often run on subdomains
  • Inspect certificates — SAN fields can reveal internal hostnames
  • Virtual host fuzzing — Multiple sites can share the same IP
  • Always check thoroughly — The obvious paths aren't always the answer

Thanks for reading! 🎉

Share this writeup

📝 Also published on Medium